1.使用跨站脚本和中间人攻击绕过Noscript安全
2.ruby-nmap:nmap的ruby版接口
https://github.com/sophsec/ruby-nmap
3.骇客给算法实现有缺陷的恶意欺诈软件打补丁,以后通过暴力破解希望很小了
http://news.yahoo.com/hackers-now-patching-ransomware-making-impossible-crack-213003921.html
4.用于进行web目录递归或不安全文件上传模糊测试的perl脚本
https://github.com/ewilded/get_docroots
5.vmware修补vRealize软件的xss漏洞
http://www.zdnet.com/article/vmware-patches-severe-xss-flaws-in-vrealize-software/
6.针对消息队列(ZeroMQ/Redis/RabbitMQ )的渗透测试工具
https://github.com/cr0hn/enteletaor
7.SHIPS介绍:linux/windows平台的集中化本地密码管理平台
8.Cisco UCS Manager 2.1(1b) Shellshock 利用poc
https://packetstormsecurity.com/files/download/136278/ciscoucs-exec.txt
9.Nemucod javascript恶意软件家族增加TeslaCrypt恶意欺诈软件
http://blog.fortinet.com/post/nemucod-adds-ransomware-routine
10.SQL Injection Cheat Sheet从2007年以后,再次更新
https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/
11.安天AVL联合猎豹首曝“多米诺”恶意应用市场APP
http://blog.avlyun.com/2016/03/2849/maliciousappstore/
12.McAfee使用web Beacons用来跟踪用户,投递定向广告
https://duo.com/assets/pdf/bring-your-own-dilemma.pdf
13.滥用GPO权限
http://www.harmj0y.net/blog/redteaming/abusing-gpo-permissions/
14.安全专家爱用python,恶意软件作者也一样
https://isc.sans.edu/forums/diary/Security+Pros+Love+Python+and+So+Do+Malware+Authors/20853
15.安装和配置EMET
16.Encrypter-Metasploit:通过单字节异或方法实现杀毒基于特征码扫描的工具
https://github.com/Sogeti-Pentest/Encrypter-Metasploit
17.BetterCap v1.5发行,增加新的TCP模块和传输层代理
https://github.com/evilsocket/bettercap/archive/v1.5.0.zip
18.ltrace是如何工作的
http://blog.packagecloud.io/eng/2016/03/14/how-does-ltrace-work/
19.Dridex僵尸网络开始加密他们的配置文件
http://blog.avira.com/dridex-starts-hardening-settings-files/
20.PE和ELF指南第二部分
http://resources.infosecinstitute.com/complete-tour-of-pe-and-elf-part-2/
21.CVE-2016-2098:以及rails的CVE-2016-2097,2个RCE,一个通过controller利用,一个通过view利用
https://groups.google.com/forum/#!msg/rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ
22.PoC||GTFO 11发行